-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The MIT Kerberos Team announces the availability of MIT Kerberos 5 Release 1.13. Please see below for a list of some major changes included, or consult the README file in the source tree for a more detailed list of significant changes.
RETRIEVING KERBEROS 5 RELEASE 1.13 ================================== You may retrieve the Kerberos 5 Release 1.13 source from the following URL: http://web.mit.edu/kerberos/dist/ More information about the krb5-1.13 release is at: http://web.mit.edu/kerberos/krb5-1.13/ Further information about Kerberos 5 may be found at the following URL: http://web.mit.edu/kerberos/ and at the MIT Kerberos Consortium web site: http://www.kerberos.org/ DES transition ============== The Data Encryption Standard (DES) is widely recognized as weak. The krb5-1.7 release contains measures to encourage sites to migrate away - From using single-DES cryptosystems. Among these is a configuration variable that enables "weak" enctypes, which defaults to "false" beginning with krb5-1.8. Major changes in 1.13 (2014-10-15) ================================== Administrator experience: * Add support for accessing KDCs via an HTTPS proxy server using the MS-KKDCP protocol. * Add support for hierarchical incremental propagation, where slaves can act as intermediates between an upstream master and other downstream slaves. * Add support for configuring GSS mechanisms using /etc/gss/mech.d/*.conf files in addition to /etc/gss/mech. * Add support to the LDAP KDB module for binding to the LDAP server using SASL. * The KDC listens for TCP connections by default. * Fix a minor key disclosure vulnerability where using the "keepold" option to the kadmin randkey operation could return the old keys. [CVE-2014-5351] User experience: * Add client support for the Kerberos Cache Manager protocol. If the host is running a Heimdal kcm daemon, caches served by the daemon can be accessed with the KCM: cache type. * When built on OS X 10.7 and higher, use "KCM:" as the default cache type, unless overridden by command-line options or krb5-config values. Performance: * Add support for doing unlocked database dumps for the DB2 KDC back end, which would allow the KDC and kadmind to continue accessing the database during lengthy database dumps. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEVAwUBVD8WPxUCTNN0nXiJAQLrdAf/aormDh4JqMbvMHPD/w5JNrb+U5nO5Nsm NeaK3qvqQa1tEe+3GMVIkUKfM7bUw+i9VWLORdPvFmzJE1oxcgCX/+eUrIfGJ1Yc //88wfOrNA/u02KuVZKvnTZIuONrSucUHAU441O7C68EMPIfMZtigRWkaGlV5bsx 9Dxm3100XgQHTtfLo5ogTrq/L9K7yKK8Z8tfzRuj8x2r9cSoxU4B2jyjSuf+zeUc n09aGjNeOqvAIW4ffyNom4zLjG6t9zXnEOyHIUEbS0ddOcKHqar/ugfWA9Mcou6e nWB03v6wNXDhyJxldEnlZdkul939WEksXwPMppY6zkvB/MY4JsPPCg== =VY6/ -----END PGP SIGNATURE----- _______________________________________________ kerberos-announce mailing list kerberos-annou...@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos-announce ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos